Stanislas0 / KDD_CUP_2020_MLTrack2_SPEITView external linksLinks
KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution
☆20Sep 29, 2020Updated 5 years ago
Alternatives and similar repositories for KDD_CUP_2020_MLTrack2_SPEIT
Users that are interested in KDD_CUP_2020_MLTrack2_SPEIT are comparing it to the libraries listed below
Sorting:
- Graph Robustness Benchmark: A scalable, unified, modular, and reproducible benchmark for evaluating the adversarial robustness of Graph M…☆98Nov 6, 2023Updated 2 years ago
- Graph Injection Adversarial Attack & Defense Dataset , extracted from KDD CUP 2020 ML2 Track☆22Aug 19, 2024Updated last year
- a general information propagation algorithm for graph learning☆13Jun 15, 2021Updated 4 years ago
- Code for Towards More Practical Adversarial Attacks on Graph Neural Networks (NeurIPS 2020)☆28Nov 13, 2021Updated 4 years ago
- Tools for "Another Flip in the Wall"☆41Jun 12, 2018Updated 7 years ago
- [ICLR 2022] Understanding and Improving Graph Injection Attack by Promoting Unnoticeability☆38Nov 27, 2023Updated 2 years ago
- ☆13Feb 4, 2025Updated last year
- Benchmark scripts for comparing tutorials in PyTorch and JAX☆14Aug 25, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 4 years ago
- Deep reinforcement learning + double oracle framework for Robust Restless Bandits☆10Jul 4, 2021Updated 4 years ago
- ☆13Dec 3, 2021Updated 4 years ago
- ☆10Jan 7, 2026Updated last month
- LSA : Layer Sustainability Analysis framework for the analysis of layer vulnerability in a given neural network. LSA can be a helpful too…☆18Mar 22, 2022Updated 3 years ago
- [UNMAINTAINED] Service for automatic updating of git repositories from GitLab.☆15Jan 15, 2014Updated 12 years ago
- An FL algorithm inspired by FedGMA☆10Oct 21, 2023Updated 2 years ago
- A Public repository for the COMeT model☆13Jul 25, 2024Updated last year
- Official Code For Dual Grained Quantization: Efficient Fine-Grained Quantization for LLM☆14Dec 27, 2023Updated 2 years ago
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- ☆12Dec 1, 2020Updated 5 years ago
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆21Aug 9, 2025Updated 6 months ago
- Code used to create the Linked WikiText-2 dataset☆16May 22, 2023Updated 2 years ago
- ☆15Nov 3, 2022Updated 3 years ago
- [ICML 2021] "Double-Win Quant: Aggressively Winning Robustness of Quantized DeepNeural Networks via Random Precision Training and Inferen…☆16Feb 13, 2022Updated 4 years ago
- PyTorch Language Modeling Toolkit for Fast Weight Programmers☆19Jun 11, 2025Updated 8 months ago
- ☆17Mar 30, 2023Updated 2 years ago
- This repository summarizes the related works on GNN and GNN-based recommendation.☆15Jun 25, 2021Updated 4 years ago
- Initially based on CASIA1 - code to get the tamper mask and generate test/train sets without data leakage between them.☆13Jun 12, 2019Updated 6 years ago
- Official Implementation for PlugIn Inversion☆16Oct 23, 2021Updated 4 years ago
- competition☆17Aug 1, 2020Updated 5 years ago
- Source code for ScaleGrad☆19Dec 28, 2021Updated 4 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Dec 8, 2022Updated 3 years ago
- This repository contains the official implementation of the paper "Reliable Graph Neural Networks via Robust Aggregation" (NeurIPS, 2020)…☆18Mar 16, 2022Updated 3 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 2 years ago
- PhD thesis (updating) of Jiatao Gu from HKU☆19Aug 10, 2018Updated 7 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- Simulator.☆101Apr 21, 2025Updated 9 months ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆75Apr 1, 2024Updated last year
- Sparse kernels for GNNs based on TVM☆17Nov 18, 2020Updated 5 years ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago